Purpose:

<?>

Objective:

<?>

Description:

<?>

Entrance Criteria:

  • <?>

Exit Criteria:

  • <?>

Process and Procedures:

Tailoring Guidelines:

  • None

Process Verification Record(s):

  • <?>
    • Stored By: <?>

Measure(s):

  • Number of non-standard operational procedures executed
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Number of incidents caused by operational problems
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Ratio of events compared to the number of incidents
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Percent of critical operational event types covered by automatic detection systems
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Number and percent of incidents causing disruption to business-critical processes
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Mean time between incidents according to IT-enabled service
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Percent of incidents resolved within an agreed-on/acceptable period of time
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Level of user satisfaction with service request fulfillment
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Mean elapsed time for handling each type of service request
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Decrease in number of recurring incidents caused by unresolved problems
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Percent of major incidents for which problems were logged
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Percent of workarounds defined for open problems
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Percent of problems logged as part of the proactive problem management activity
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Number of problems for which a satisfactory resolution that addressed root causes were found
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Percent of IT services meeting up-time requirements
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Percent of successful and timely restoration from backup or alternate media copies
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Percent of backup media transferred and stored securely
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Number of critical business systems not covered by the plan
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Number of exercises and tests that have achieved recovery objectives
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Frequency of tests
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Percent of agreed-on improvements to the plan that have been reflected in the plan
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Percent of issues identified that have been subsequently addressed in the plan
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Percent of internal and external stakeholders that have received training
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Percent of issues identified that have been subsequently addressed  in the training materials
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Number of vulnerabilities discovered
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Number of firewall breaches
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Percent of individuals receiving awareness training relating to use of endpoint devices
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Number of incidents involving endpoint devices
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Number of unauthorized devices detected on the network or in the end-user environment
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Average time between change and update of accounts
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Number of accounts (vs. number of authorized users/staff)
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Percent of periodic tests of environmental security devices
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Average rating for physical security assessments
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Number of physical security-related incidents
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Number of incidents relating to unauthorized access to information
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Percent of completed inventory of critical processes and key controls
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Percent of coverage of key controls within test plans
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Number of incidents and audit report findings indicating failure of key controls
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Percent of business process roles with assigned access rights and levels of authority
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Percent of business process roles with clear separation of duties
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Number of incidents and audit findings due to access or separation of duties violations
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Percent of completeness of traceable transaction log
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>
  • Number of incidents where transaction history cannot be recovered
    • Maintained By: <?>
    • Submitted By: <?>
    • Frequency of Submission: <?>

References & Related Standard:

  • BS 25999:2007, Business Continuity Standard
  • ITIL V3 2011
    • Service Design, 4.6 IT Service Continuity Management
    • Service Operation, 4.1 Event Management
    • Service Operation, 4.2 Incident Management
    • Service Operation, 4.3 Request Fulfilment
    • Service Operation, 4.4 Problem Management
    • Service Operation, 4.5 Access Management
  • ISO/IEC 20000
    • 6.1 Service level management
    • 6.3 Service continuity and availability management
    • 8.2 Indecent management
    • 8.3 Problem management
  • ISO 27002:2011
    • Code of practice for information security management
    • 13. Information Security Incident Management
    • 14. Business Continuity Management
  • NIST SP800-53 Rev1, Recommended Security Controls for USA Federal Information Systems